CN105204962B - Data backup method and device and server - Google Patents

Data backup method and device and server Download PDF

Info

Publication number
CN105204962B
CN105204962B CN201510623597.XA CN201510623597A CN105204962B CN 105204962 B CN105204962 B CN 105204962B CN 201510623597 A CN201510623597 A CN 201510623597A CN 105204962 B CN105204962 B CN 105204962B
Authority
CN
China
Prior art keywords
password
data
user
check
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510623597.XA
Other languages
Chinese (zh)
Other versions
CN105204962A (en
Inventor
危文
郭镇龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201510623597.XA priority Critical patent/CN105204962B/en
Publication of CN105204962A publication Critical patent/CN105204962A/en
Application granted granted Critical
Publication of CN105204962B publication Critical patent/CN105204962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a data backup method, a data backup device and a server. A data backup method is applied to a server, and the method can comprise the following steps: receiving backup data sent by a terminal in a preset transmission encryption mode, wherein the backup data is as follows: after receiving a backup request aiming at target data, the terminal carries out first encryption processing on the target data in the terminal; and saving the backup data. By applying the technical scheme provided by the embodiment of the invention, not only the source end is encrypted, but also the encryption is carried out in the transmission process.

Description

A kind of data back up method, device and server
Technical field
The present invention relates to computer application technology, in particular to a kind of data back up method, device and server.
Background technique
With the fast development of terminal technology, various types of terminals are continued to bring out, such as desktop computer, laptop, hand Machine, tablet computer etc., these terminals have become the important tool of people's routine work and life, and the frequency used by people is got over Come higher.User can generate various data during using terminal in the terminal, for example, photo, video file, The data such as contact person.With the accumulation of time, the data stored in terminal are more and more, and the memory capacity of terminal is limited , so, many users may need to back up the data in terminal in the server of cloud provider, to work as terminal Memory space inadequate when, can in the terminal by the data having backed up delete, to save the memory space of terminal.
In the prior art, when user has, and the target data in terminal is backuped to the demand of server, terminal can be incited somebody to action Target data is transferred directly to server after being encrypted.
This data back up method is only encrypted in data source, and safety is lower.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of data back up method, device and server, to a certain degree On improve the safeties of data.Technical solution is as follows:
A kind of data back up method is applied to server, which comprises
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: described After terminal receives the backup request for target data, after carrying out the first encryption to the target data in itself Data;
Save the Backup Data.
It is described to save the Backup Data in a kind of specific embodiment of the invention, comprising:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption.
In a kind of specific embodiment of the invention, the method also includes:
The request of checking for the user that the terminal is sent is received, described check in request carries user identifier and check close Code;
Password is checked described in judgement and what is pre-saved corresponding with the user identifier checks whether password is consistent;
If it is, the Backup Data is decrypted, obtained corresponding target data is showed described User.
In a kind of specific embodiment of the invention, when the user identifier pair checking password and pre-saving Answer when checking that password is inconsistent, the method also includes:
The prompt information of password mistake is checked in output.
In a kind of specific embodiment of the invention, the method also includes:
When it is described check that password is corresponding with the user identifier pre-saved and check that password is inconsistent when, determination is checked Password authentification failure;
If continuous authentication failed number reaches preset threshold, pause checks service to the user.
In a kind of specific embodiment of the invention, the method also includes:
In the case where continuous authentication failed number reaches preset threshold, the association user of Xiang Suoshu user sends early warning letter Breath.
In a kind of specific embodiment of the invention, following steps are first passed through in advance and obtain check corresponding with user identifier Password:
When being initially received the logging request for the user that the terminal is sent, output checks that boundary is arranged in password first Face, receive and save the user this check the first set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, output checks that boundary is arranged in password second Face, receive and save the user this check the second set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship.
A kind of data backup device, is applied to server, and described device includes:
Data reception module, the Backup Data sent for receiving terminal using preset transmission cipher mode, wherein institute State Backup Data are as follows: after the terminal receives the backup request for target data, in itself to the target data into Data after the first encryption of row;
Data storage module, for saving the Backup Data.
In a kind of specific embodiment of the invention, the data storage module is specifically used for:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption.
In a kind of specific embodiment of the invention, described device further include:
Check request receiving module, it is described to check in request for receiving the request of checking of user that the terminal is sent It carries user identifier and checks password;
Consistency judgment module described checked that password is corresponding with the user identifier pre-saved and is checked for judging Whether password is consistent, if it is, trigger data display module;
The data display module, for the judging result of the consistency judgment module be in the case where, to institute It states Backup Data to be decrypted, obtained corresponding target data is showed into the user.
In a kind of specific embodiment of the invention, described device further include:
Prompt information output module, for exporting in the case where the judging result of the consistency judgment module is no Check the prompt information of password mistake.
In a kind of specific embodiment of the invention, described device further include:
Authentication failed determining module, for check password and what is pre-saved corresponding with the user identifier looks into when described When seeing that password is inconsistent, determines and check that password authentification fails;
Service pause module is checked, for suspending to this in the case where continuous authentication failed number reaches preset threshold User's checks service.
In a kind of specific embodiment of the invention, described device further include:
Warning information sending module, in the case where continuous authentication failed number reaches preset threshold, to the use The association user at family sends warning information.
In a kind of specific embodiment of the invention, described device further include:
Check password preserving module, following steps acquisition is corresponding with user identifier to check password for first passing through in advance:
When being initially received the logging request for the user that the terminal is sent, output checks that boundary is arranged in password first Face, receive and save the user this check the first set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, output checks that boundary is arranged in password second Face, receive and save the user this check the second set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship.
To achieve the goals above, the embodiment of the invention also provides a kind of storage mediums, wherein the storage medium is used for Application program is stored, the application program for executing a kind of data back up method of the present invention at runtime.
To achieve the goals above, the embodiment of the invention also provides a kind of application programs, wherein the application program is used for A kind of data back up method of the present invention is executed at runtime.
To achieve the goals above, the embodiment of the invention also provides a kind of servers, comprising:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual lead to Letter;
The memory stores executable program code;
The processor is run by reading the executable program code stored in the memory can be performed with described The corresponding program of program code, to be used for:
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: described After terminal receives the backup request for target data, after carrying out the first encryption to the target data in itself Data;
Save the Backup Data.
Using technical solution provided by the embodiment of the present invention, the terminal that server receives is encrypted using preset transmission The Backup Data that mode is sent is terminal after receiving the backup request for target data, carries out first to target data Data after encryption, user's target data to be backed up, are not only encrypted in source, but also in transmission process It is encrypted, compared to the prior art only encrypted in source, technical solution provided by the embodiment of the present invention is one Determine the safety that data are improved in degree.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of data back up method in the embodiment of the present invention;
Fig. 2 is the selection schematic diagram of data to be backed up in the embodiment of the present invention;
Fig. 3 is gesture password input interface schematic diagram in the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of data backup device in the embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of server in the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with this hair Attached drawing in bright embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described Embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field Those of ordinary skill's every other embodiment obtained without making creative work, belongs to protection of the present invention Range.
It is shown in Figure 1, it is a kind of implementation flow chart of data back up method provided by the embodiment of the present invention, this method Applied to server, may comprise steps of:
S110: the Backup Data that terminal is sent using preset transmission cipher mode is received;
Wherein, the Backup Data are as follows: right in itself after the terminal receives the backup request for target data The target data carries out the data after the first encryption.
Nowadays, more and more various for storing the type of the storage medium of the data of user, for example, user can be by data It stores in the terminal, alternatively, can store data into mobile hard disk, alternatively, cloud provider can be stored data into In server.
The memory capacity of the memory capacity of the terminal or mobile hard disk that use relative to user, the server of cloud provider is big Much, the storage system constructed can be extending transversely, increases memory capacity.Moreover, with the fast development of Internet technology, Cloud provider gradually increases, and more users can select to store data into the server of cloud provider, realizes data backup Purpose.
In practical applications, the data that storage is backed up into the server of cloud provider are mostly the significant datas of user, this A little data need to transmit in a network, concern of the safety of data by more and more users.
It, can be by terminal to clothes when user has by data in the demand that the server of cloud provider makes a backup store Business device sends the backup request for being directed to target data.Target data is user's data to be backed up.
As shown in Fig. 2, plurality of pictures is stored on the mobile phone that user uses, if user wants the portion in these pictures Divide or full backup is into the server of cloud provider, then can select the picture to be backed up on mobile phone, each picture is equal It is user's target data to be backed up, after selection, corresponding backup button " Back up now " can be clicked, i.e., visually To have issued the backup request for being directed to target data.
Terminal and the server of cloud provider are communicatively coupled, terminal receive user sending for target data After backup request, need to carry out target data the first encryption, and the target data after the first encryption of progress is true It is set to Backup Data.
First encryption is carried out to target data, that is, data source is encrypted, guarantee is transmitted in a network When data safety.When terminal carries out the first encryption to target data, used specific cipher mode can root Symmetric cryptography mode or asymmetric encryption mode, common Encryption Algorithm such as DES (Data are selected according to actual conditions Encryption Standard, data encryption standards) algorithm, RSA cryptographic algorithms etc., the embodiment of the present invention is without limitation.
After terminal carries out the first encryption to target data, Backup Data is obtained, preset transmission cipher mode is used Backup Data is sent to server, the safety of data can be further enhanced in this way.
Preset transmission cipher mode can be HTTPS mode.The full name of HTTPS are as follows: Hyper Text Transfer Protocol over Secure Socket Layer, i.e. security socket layer hypertext transfer protocol, for safety SSL (Secure Socket Layer, security socket layer) Encryption Transmission Protocol.HTTPS is in HTTP (Hyper Text Transfer Protocol, hypertext transfer protocol) on the basis of joined ssl protocol, SSL carrys out the service for checking credentials by certificate The identity of device, it is ensured that the safety of data transmission.
Certainly, those skilled in the art also can be used other encrypted transmission modes and Backup Data be sent to server, The embodiment of the present invention is without limitation.
After server receives Backup Data of the terminal using preset transmission cipher mode transmission, step can be continued to execute The operation of rapid S120.
S120: the Backup Data is saved.
Server receive terminal using it is preset transmission cipher mode send Backup Data, using with preset transmission The Backup Data received is decrypted in the corresponding manner of decryption of cipher mode, saves Backup Data, backup herein Data are that the data after the first encryption are carried out to target data.
Using technical solution provided by the embodiment of the present invention, the terminal that server receives is encrypted using preset transmission The Backup Data that mode is sent is terminal after receiving the backup request for target data, carries out first to target data Data after encryption, user's target data to be backed up, are not only encrypted in source, but also in transmission process It is encrypted, compared to the prior art only encrypted in source, technical solution provided by the embodiment of the present invention is one Determine the safety that data are improved in degree.
In a kind of specific embodiment of the invention, server can be carried out at the second encryption the Backup Data Reason, and save the Backup Data after carrying out the second encryption.
After server receives the Backup Data of terminal transmission, the second encryption can be carried out to Backup Data, and protect Backup Data after depositing into the second encryption of row.It should be noted that server carries out the second encryption to Backup Data When used specific cipher mode can select symmetric cryptography mode or asymmetric encryption mode according to the actual situation, as usual DES (Data Encryption Standard, the data encryption standards) Encryption Algorithm seen, RSA cryptographic algorithms etc., server into Used specific cipher mode and terminal carry out used specific when the first encryption when the second encryption of row Cipher mode can be same or different, and the embodiment of the present invention is without limitation.
In this way, terminal is first in source to target when user backups to target data in the server of cloud provider Data carry out the first encryption, and preset encrypted transmission mode is used during backup data transmitting, and server receives To after Backup Data, the second encryption is carried out to Backup Data again, by multi-enciphering, may further ensure that the peace of data Quan Xing.
In one embodiment of the invention, this method may also comprise the following steps::
Step 1: receiving the request of checking for the user that the terminal is sent, it is described check in request carry user identifier with Check password;
Step 2: checking password described in judgement and pre-save it is corresponding with the user identifier check password whether one It causes, if it is, executing step 3;
Step 3: being decrypted the Backup Data, and obtained corresponding target data is showed the use Family.
For convenience of description, above three step is combined and is illustrated.
In practical applications, it after cloud provider needs user to register, log on its server, could be mentioned for user For the service of corresponding data backup.That is, when user has the need for backing up data in the server of cloud provider When asking, need the operation such as to complete registration on the server of the cloud provider, log in.Equally, when user has in cloud provider When server checks the demand for the data having backed up, it is also desirable to complete register on the server of the cloud provider.
For the user after logging in, its data backed up on the server of cloud provider can be checked.
To be further ensured that Information Security, avoid because login name, the login password of user are stolen and caused by number The problem of according to being stolen, server can pre-save it is corresponding with user identifier check password, each user identifier is corresponding One is checked password.Only user correctly logs in, and has input pre-saving with server with user user identifier pair That answers checks that password is consistent and checks password, and server could show the data that back up in server to the user.
When user has when the checking request of data for checking that it is backed up on the server, can be sent out by terminal to server It send and checks request accordingly, user identifier can be carried and check password by checking in request.Server receives this and checks request Afterwards, first to checking that the accuracy of password verifies, that is, judge the carrying checked in request check password and its protect in advance Deposit it is corresponding with the user identifier whether check password consistent, if unanimously, it may be considered that being verified.
In a kind of specific embodiment of the invention, server can first pass through following steps acquisition and user identifier in advance It is corresponding to check password:
When being initially received the logging request for the user that the terminal is sent, output checks that boundary is arranged in password first Face, receive and save the user this check the first set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, output checks that boundary is arranged in password second Face, receive and save the user this check the second set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship.
That is, server can guide user setting when user's first login or first progress data are checked It checks password, and user setting is checked into password storage corresponding with the user identifier of user.Each user identifier is one corresponding Check password.
Backup Data is decrypted in server, if server storage is not carry out the standby of the second encryption Part data, then need to only use manner of decryption corresponding with the first encryption mode to be decrypted, if server is deposited Storage is the Backup Data for having carried out the second encryption, then needs using decryption side corresponding with the second encryption mode After formula is decrypted, reuses manner of decryption corresponding with the first encryption mode and be decrypted.To backup After data are decrypted, obtained corresponding target data is showed into user, so that user checks.
In this way, further providing safety for the data that user backs up in the server.
In practical applications, user setting checks that password can be the character string that is made of character.When terminal be with When the terminal of touch screen, user setting checks that password can also be gesture password, as shown in figure 3, user has input correctly Gesture password just thinks that it checks that requests verification passes through, and can show corresponding target data for it.
In one embodiment of the invention, it checks that password is corresponding with the user identifier pre-saved when described and looks into When seeing that password is inconsistent, the prompt information for checking password mistake can be exported.User checks that the prompt of password mistake is believed according to this Breath, can re-enter and check password.What server can re-enter user checks that password is verified, and whether see can test It demonstrate,proves successfully.
In one embodiment of the invention, it checks that password is corresponding with the user identifier pre-saved when described and looks into When seeing that password is inconsistent, can determine check password authentification fail, check request may and non-user operation and sending. If continuous authentication failed number reaches preset threshold, pause checks service to the user.It in practical applications, can be pre- If a freezing duration, since execute to user check service pausing operation timing, after reaching preset freezing duration, then Starting checks service to the user.In this way, may further ensure that the safety for the data that user backs up in the server.
In another embodiment of the present invention, this method may also comprise the following steps::
In the case where continuous authentication failed number reaches preset threshold, the association user of Xiang Suoshu user sends early warning letter Breath.
The relevant information of its association user, such as phone number, the email address of association user can be set in user.When with Family input check password and pre-save it is corresponding with user identifier determine authentication failed when checking that password is inconsistent, In the case that continuous authentication failed number reaches preset threshold, warning information can be sent to the association user of the user.Such as, to Association user sends short message or mail etc., and prompting the user may be illegal user.
It should be noted that threshold value can be set and be adjusted according to the actual situation, the embodiment of the present invention does not do this Limitation.
Certainly, suspend to the user check service after, which can be given for change by password or other complaint approach It is regained after progress authentication and checks service accordingly.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of data backup device, which is answered For server.Shown in Figure 4, the apparatus may include with lower module:
Data reception module 210, the Backup Data sent for receiving terminal using preset transmission cipher mode, In, the Backup Data are as follows: after the terminal receives the backup request for target data, to the number of targets in itself According to the data after the first encryption of progress;
Data storage module 220, for saving the Backup Data.
Using device provided by the embodiment of the present invention, the terminal that server receives uses preset transmission cipher mode The Backup Data of transmission is terminal after receiving the backup request for target data, carries out the first encryption to target data Data that treated, user's target data to be backed up, are not only encrypted in source, but also are also carried out in transmission process Encryption, compared to the prior art only encrypted in source, technical solution provided by the embodiment of the present invention is in certain journey The safety of data is improved on degree.
In a kind of specific embodiment of the invention, the data storage module 220 can be specifically used for:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption.
In one embodiment of the invention, described device can also comprise the following modules:
Check request receiving module, it is described to check in request for receiving the request of checking of user that the terminal is sent It carries user identifier and checks password;
Consistency judgment module described checks password and what is pre-saved corresponding with the user identifier looks into for judging See whether password is consistent, if it is, trigger data display module;
The data display module, for the judging result of the consistency judgment module be in the case where, to institute It states Backup Data to be decrypted, obtained corresponding target data is showed into the user.
In one embodiment of the invention, described device can also comprise the following modules:
Prompt information output module, for exporting in the case where the judging result of the consistency judgment module is no Check the prompt information of password mistake.
In one embodiment of the invention, described device can also comprise the following modules:
Authentication failed determining module is checked for checking that password is corresponding with the user identifier pre-saved described in When password is inconsistent, determines and check that password authentification fails;
Service pause module is checked, for suspending to institute in the case where continuous authentication failed number reaches preset threshold That states user checks service.
In one embodiment of the invention, described device can also comprise the following modules:
Warning information sending module, in the case where continuous authentication failed number reaches preset threshold, to the use The association user at family sends warning information.
In one embodiment of the invention, described device can also comprise the following modules:
Check password preserving module, following steps acquisition is corresponding with user identifier to check password for first passing through in advance:
When being initially received the logging request for the user that the terminal is sent, output checks that boundary is arranged in password first Face, receive and save the user this check the first set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, output checks that boundary is arranged in password second Face, receive and save the user this check the second set interface of password setting check password, this is checked into password and institute The user identifier for stating user establishes corresponding relationship.
Corresponding to above method embodiment and Installation practice, the embodiment of the invention also provides a kind of server, ginsengs As shown in Figure 5, which may include:
Processor 310, memory 320, communication interface 330 and bus;
The processor 310, the memory 320 are connected by the bus with the communication interface 330 and complete phase Communication between mutually;
The memory 320 stores executable program code;
The processor 310 run by reading the executable program code stored in the memory 320 with it is described The corresponding program of executable program code, to be used for:
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: described After terminal receives the backup request for target data, after carrying out the first encryption to the target data in itself Data;
Save the Backup Data.
To achieve the goals above, the embodiment of the invention also provides a kind of storage mediums, wherein the storage medium is used for Application program is stored, the application program for executing a kind of data back up method described in the embodiment of the present invention at runtime. Wherein, a kind of data back up method of the present invention, comprising:
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: described After terminal receives the backup request for target data, after carrying out the first encryption to the target data in itself Data;
Save the Backup Data.
To achieve the goals above, the embodiment of the invention also provides a kind of application programs, wherein the application program is used for A kind of data back up method described in the embodiment of the present invention is executed at runtime.Wherein, a kind of data backup of the present invention Method, comprising:
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: described After terminal receives the backup request for target data, after carrying out the first encryption to the target data in itself Data;
Save the Backup Data.It should be noted that, in this document, relational terms such as first and second and the like It is only used to distinguish one entity or operation from another entity or operation, without necessarily requiring or implying these There are any actual relationship or orders between entity or operation.Moreover, the terms "include", "comprise" or its is any Other variants are intended to non-exclusive inclusion, so that including the process, method, article or equipment of a series of elements Include not only those elements, but also including other elements that are not explicitly listed, or further includes for this process, side Method, article or the intrinsic element of equipment.In the absence of more restrictions, limited by sentence "including a ..." Element, it is not excluded that there is also other identical elements in the process, method, article or apparatus that includes the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Those of ordinary skill in the art will appreciate that all or part of the steps in realization above method embodiment is can It is completed with instructing relevant hardware by program, the program can store in computer-readable storage medium, The storage medium designated herein obtained, such as: ROM/RAM, magnetic disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (13)

1. a kind of data back up method, which is characterized in that be applied to server, which comprises
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: the terminal After receiving the backup request for target data, the number after the first encryption is carried out to the target data in itself According to;
Save the Backup Data;
It is described to save the Backup Data, comprising:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption;Described Cipher mode used in two encryptions is different from cipher mode used in first encryption.
2. the method according to claim 1, wherein the method also includes:
The request of checking for the user that the terminal is sent is received, described check in request carries user identifier and check password;
Password is checked described in judgement and what is pre-saved corresponding with the user identifier checks whether password is consistent;
If it is, the Backup Data is decrypted, obtained corresponding target data is showed into the user.
3. according to the method described in claim 2, it is characterized in that, checking that password is marked with the user pre-saved when described Know it is corresponding when checking that password is inconsistent, the method also includes:
The prompt information of password mistake is checked in output.
4. according to the method described in claim 2, it is characterized in that, the method also includes:
When it is described check that password is corresponding with the user identifier pre-saved and check that password is inconsistent when, password is checked in determination Authentication failed;
If continuous authentication failed number reaches preset threshold, pause checks service to the user.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
In the case where continuous authentication failed number reaches preset threshold, the association user of Xiang Suoshu user sends warning information.
6. according to the method described in claim 2, being marked it is characterized by further comprising: first passing through following steps in advance and obtaining with user Know and corresponding check password:
When being initially received the logging request for the user that the terminal is sent, the first set interface of password is checked in output, Receive and save the user this check the first set interface of password setting check password, this is checked into password and the use The user identifier at family establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, the second set interface of password is checked in output, Receive and save the user this check the second set interface of password setting check password, this is checked into password and the use The user identifier at family establishes corresponding relationship.
7. a kind of data backup device, which is characterized in that be applied to server, described device includes:
Data reception module, the Backup Data sent for receiving terminal using preset transmission cipher mode, wherein described standby Part data are as follows: after the terminal receives the backup request for target data, the is carried out to the target data in itself Data after one encryption;
Data storage module, for saving the Backup Data;
The data storage module, is specifically used for:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption;Described Cipher mode used in two encryptions is different from cipher mode used in first encryption.
8. device according to claim 7, which is characterized in that described device further include:
Check request receiving module, for receiving the request of checking of user that the terminal is sent, it is described check request in carry User identifier and check password;
Consistency judgment module, for judge it is described check password and pre-save it is corresponding with the user identifier check it is close Whether code is consistent, if it is, trigger data display module;
The data display module, for the judging result of the consistency judgment module be in the case where, to described standby Part data are decrypted, and obtained corresponding target data is showed the user.
9. device according to claim 8, which is characterized in that described device further include:
Prompt information output module, in the case where the judging result of the consistency judgment module is no, output to be checked The prompt information of password mistake.
10. device according to claim 8, which is characterized in that described device further include:
Authentication failed determining module checks password for checking that password is corresponding with the user identifier pre-saved described in When inconsistent, determine and check that password authentification fails;
Service pause module is checked, for suspending to the use in the case where continuous authentication failed number reaches preset threshold Service is checked at family.
11. device according to claim 10, which is characterized in that described device further include:
Warning information sending module, in the case where continuous authentication failed number reaches preset threshold, Xiang Suoshu user's Association user sends warning information.
12. device according to claim 8, which is characterized in that described device further include:
Check password preserving module, following steps acquisition is corresponding with user identifier to check password for first passing through in advance:
When being initially received the logging request for the user that the terminal is sent, the first set interface of password is checked in output, Receive and save the user this check the first set interface of password setting check password, this is checked into password and the use The user identifier at family establishes corresponding relationship;
Alternatively,
In when the checking request of the user for being initially received the terminal transmission, the second set interface of password is checked in output, Receive and save the user this check the second set interface of password setting check password, this is checked into password and the use The user identifier at family establishes corresponding relationship.
13. a kind of server characterized by comprising
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory The corresponding program of code, to be used for:
Receive the Backup Data that terminal is sent using preset transmission cipher mode, wherein the Backup Data are as follows: the terminal After receiving the backup request for target data, the number after the first encryption is carried out to the target data in itself According to;
Save the Backup Data;
It is described to save the Backup Data, comprising:
Second encryption is carried out to the Backup Data, and saves the Backup Data after carrying out the second encryption;Described Cipher mode used in two encryptions is different from cipher mode used in first encryption.
CN201510623597.XA 2015-09-25 2015-09-25 Data backup method and device and server Active CN105204962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510623597.XA CN105204962B (en) 2015-09-25 2015-09-25 Data backup method and device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510623597.XA CN105204962B (en) 2015-09-25 2015-09-25 Data backup method and device and server

Publications (2)

Publication Number Publication Date
CN105204962A CN105204962A (en) 2015-12-30
CN105204962B true CN105204962B (en) 2019-04-12

Family

ID=54952657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510623597.XA Active CN105204962B (en) 2015-09-25 2015-09-25 Data backup method and device and server

Country Status (1)

Country Link
CN (1) CN105204962B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453335B (en) * 2016-10-19 2020-01-14 Oppo广东移动通信有限公司 Data transmission method and device
CN109711185A (en) * 2019-01-04 2019-05-03 杭州卓凯科技有限公司 Net based on MongoDB about goods vehicle platform data storage system and method
CN111277702B (en) * 2020-01-21 2021-02-09 北京连山科技股份有限公司 Multilink safety mobile phone companion system
CN111290884A (en) * 2020-02-19 2020-06-16 浙江口碑网络技术有限公司 Data backup method and device for cash register equipment
CN116860526B (en) * 2023-09-04 2024-02-09 善恒展创(深圳)发展合伙企业(有限合伙) User data processing method and system based on information security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051664A (en) * 2012-08-14 2013-04-17 深圳市朗科科技股份有限公司 File management method and device for cloud storage system as well as cloud storage system
CN103457995A (en) * 2013-06-07 2013-12-18 北京百纳威尔科技有限公司 Data information storage method for terminal equipment, terminal equipment and cloud terminal server
CN104092551A (en) * 2014-07-24 2014-10-08 福建升腾资讯有限公司 Safe secret key transmission method based on RSA algorithm

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8589680B2 (en) * 2010-04-07 2013-11-19 Apple Inc. System and method for synchronizing encrypted data on a device having file-level content protection
CN104468627B (en) * 2014-12-30 2018-09-04 成都三零瑞通移动通信有限公司 A kind of data ciphering method and system carrying out terminal data backup by server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051664A (en) * 2012-08-14 2013-04-17 深圳市朗科科技股份有限公司 File management method and device for cloud storage system as well as cloud storage system
CN103457995A (en) * 2013-06-07 2013-12-18 北京百纳威尔科技有限公司 Data information storage method for terminal equipment, terminal equipment and cloud terminal server
CN104092551A (en) * 2014-07-24 2014-10-08 福建升腾资讯有限公司 Safe secret key transmission method based on RSA algorithm

Also Published As

Publication number Publication date
CN105204962A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
US10897455B2 (en) System and method for identity authentication
US10719602B2 (en) Method and device for realizing session identifier synchronization
US10009327B2 (en) Technologies for secure storage and use of biometric authentication information
CN107251035B (en) Account recovery protocol
CN105204962B (en) Data backup method and device and server
EP2314090B1 (en) Portable device association
CN110798315B (en) Data processing method and device based on block chain and terminal
EP2316097B1 (en) Protocol for device to station association
US20170208049A1 (en) Key agreement method and device for verification information
US11463435B2 (en) Identity authentication method and system based on wearable device
US11818120B2 (en) Non-custodial tool for building decentralized computer applications
US20140310793A1 (en) Application login method and apparatus, and mobile terminal therefor
US11374767B2 (en) Key-based authentication for backup service
US11356442B2 (en) Wearable device-based identity authentication method and system
CN110933484A (en) Management method and device of wireless screen projection equipment
US8799646B1 (en) Methods and systems for authenticating devices
CN109981576B (en) Key migration method and device
CN105577619B (en) Client login method, client and system
US11809540B2 (en) System and method for facilitating authentication via a short-range wireless token
CN114065170A (en) Method and device for acquiring platform identity certificate and server
CN111740938A (en) Information processing method and device, client and server
KR20150104667A (en) Authentication method
CN115189975A (en) Login method, login device, electronic equipment and storage medium
CN105825096A (en) Startup control method, computer equipment and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant